John_RIP_Test

AMD Ryzen 7 7700 8-Core testing with a MSI PRO A620M-E (MS-7E28) v1.0 (1.30 BIOS) and MSI AMD Raphael 512MB on Fedora Linux 39 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2404042-NE-JOHNRIPTE50
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
J_R_T-1
April 04
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


John_RIP_TestOpenBenchmarking.orgPhoronix Test SuiteAMD Ryzen 7 7700 8-Core @ 5.39GHz (8 Cores / 16 Threads)MSI PRO A620M-E (MS-7E28) v1.0 (1.30 BIOS)AMD Device 14d832GB2000GB KINGSTON SFYRDK2000GMSI AMD Raphael 512MBAMD Rembrandt Radeon HD AudioSyncMasterRealtek RTL8111/8168/8211/8411Fedora Linux 396.7.10-200.fc39.x86_64 (x86_64)GNOME Shell 45.5X Server + Wayland4.6 Mesa 23.3.6 (LLVM 17.0.6 DRM 3.57)GCC 13.2.1 20240316btrfs1920x1200ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerOpenGLCompilerFile-SystemScreen ResolutionJohn_RIP_Test BenchmarksSystem Logs- Transparent Huge Pages: madvise- Scaling Governor: amd-pstate-epp powersave (EPP: power) - CPU Microcode: 0xa601203 - SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Vulnerable: Safe RET no microcode + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS IBPB: conditional STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected

John_RIP_Testjohn-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper: HMAC-SHA512john-the-ripper: MD5J_R_T-12359885852234381184016672245667OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptJ_R_T-15K10K15K20K25KSE +/- 32.51, N = 3235981. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lm -lrt -ldl -lcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKJ_R_T-120K40K60K80K100KSE +/- 86.57, N = 3858521. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lm -lrt -ldl -lcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: BlowfishJ_R_T-15K10K15K20K25KSE +/- 36.66, N = 3234381. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lm -lrt -ldl -lcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512J_R_T-130M60M90M120M150MSE +/- 109371.44, N = 31184016671. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lm -lrt -ldl -lcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5J_R_T-1500K1000K1500K2000K2500KSE +/- 7838.65, N = 322456671. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lm -lrt -ldl -lcrypt